2021年全球勒索软件报告(英)-26正式版_第1页
2021年全球勒索软件报告(英)-26正式版_第2页
2021年全球勒索软件报告(英)-26正式版_第3页
2021年全球勒索软件报告(英)-26正式版_第4页
2021年全球勒索软件报告(英)-26正式版_第5页
已阅读5页,还剩22页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

Followuson:

Twitter,

Instagram,

Facebook,

LinkedIn,

YouTube

Subscribetoourblog:

/blog

TableofContents

Introduction

1

HackersAren’tOnlyTargetingSMBs…

14

KeyFindings

2

AlmostHalfOfMSPsPartnerWithMSSPs

15

COVID-19andSecurity

3

WindowsEndpointSystemsApplications

16

MostTargetedbyHackers

AVarietyofMalwareTargetingSMBs

4

RansomwareCreepsIntoSaaSApps

17

RansomwareStillaMajorChallengeforMSPs

5

MostCommonRansomwareRecoveryMethods

18

RansomwareAwareness

7

BCDRClientsAreLessLikelytoExperience

20

RansomwareContinuestoSkirtCybersecurity

8

SignificantDowntime

Efforts

FinalTakeaways

22

SMBsKeepTakingTheBait

9

AdditionalResources

23

TheAftermathofAttacks

10

AbouttheReport

24

DowntimeFarMoreCostlyThanRansom

11

StillLocking(AfterAllTheseYears)

12

IndustriesMostSusceptibletoRansomware

13

Datto’sGlobalStateoftheChannelRansomwareReport ii

Introduction

Datto’sAnnualGlobalStateoftheChannelRansomwareReportcomprisesstatisticspulledfromasurveyofmorethan1,000managedserviceproviders(MSPs)aroundtheworld.Thereportprovidesuniquevisibilityintothestateofransomwarefromtheperspectiveofthe

ITchannelandtheirsmallandmediumbusiness(SMB)clientswhoaredealingwiththeseinfectionsonadailybasis.Thereportprovidesawealthofdetailonransomware,includingyear-over-yeartrends,frequency,targets,impact,andrecommendationsforensuringrecoveryandcontinuityinthefaceofthisgrowingthreat.

Withrespecttothecurrentclimate,thereportalsocoverstheimpactthatCOVID-19andtheincreaseinremoteworkandcloudcomputinghashadonransomwaretrends.

Thegoalofthisreportistohelpshedlightonthecurrentcybersecuritylandscapebusinessesarefacing.AtDatto,webelievethereisnolimittowhatsmallandmediumbusinessescanachievewiththerighttechnology.WehopethattheinformationcompiledhereenablesMSPstoeducatetheirclientsandworkwiththemtomitigatetheriskransomwareposesonbusinesses.

Datto’sGlobalStateoftheChannelRansomwareReport 1

KeyFindings

1Ransomwareisstillthenumberonemalwarethreat.Nearly70%ofMSPsreportransomwareasthemostcommonmalwarethreattoSMBs.

2COVID-19hashadanimpactonsecurity—butnotasmuchasyoumightthink.MSPsweresplitonthesecurityimpactoftheglobalpandemic.

3TheransomwaredisconnectbetweenMSPsandSMBsremains.84%ofMSPsare‘veryconcerned’aboutransomware,

butonly30%reportthattheirclientsfeelthesame.

4SMBsaren’ttheonlybusinessesbeingtargeted.95%ofMSPsagreethattheirownbusinessesareincreasinglybeingtargetedwithattacks.

5Phishingemailstopthesuccessfulattackvectorlist.Lackofcybersecurityeducation,weakpasswords,andpooruserpracticesareamongtheothertopcausesofransomware.

6

7

8

9

10

Theaftermathofanattackisnothingnice.62%ofMSPssaidclients’productivitywasimpactedduetoattacks,and39%saidtheirclientsexperiencedbusiness-threateningdowntime.

Theaverageransomrequestedbyhackersstayedroughlythesameyear-over-year.MSPsreporttheaveragerequestedransomforSMBsis$5,600perincident,comparedto$5,900lastyear.

MSPsreportthattheaveragecostofdowntimeis94%greaterthanitwasin2019.Downtimecostsarenearly50Xgreaterthantheransomrequestedin2020.

91%ofMSPsreportthatclientswithBCDRsolutionsin

placearelesslikelytoexperiencesignificantdowntimeduringaransomwareattack.

92%ofMSPspredictransomwareattackswillcontinueat

current,orworse,rates.

Datto’sGlobalStateoftheChannelRansomwareReport 2

COVID-19andSecurity

AMixedBag

ManyMSPsreportedthatthenumberofransomwareattacksandsecurityvulnerabilitiesincreasedduringCOVID-19duetoanincreaseinremoteworkandcloudcomputing.However,itisworthpointingoutthatitwasn’tanoverwhelmingincrease—moreofanevensplitbetweenthosewhosawanincreaseandthosewhodidnot.

“[Personaldevices]havebeenintroducedtocorporate/businessenvironmentsdespiteobjectionsre:securitypolicies/endpointprotection,etc.Additionally,therearesignificantadditionalremoteworksecuritythreats,fromdevicethefttofamilymembersusingcorporatemachinesforpersonalwork/study,”saidanother.

59%

ofMSPssaidremoteworkduetoCOVID-19resultedinincreasedransomwareattacks.

52%

ofMSPsreportedthatshiftingclientworkloadstothecloudcamewithincreasedsecurityvulnerabilities.

MSPsreporthealthcareasthemostvulnerableindustryduringthepandemic(59%),followedbyfinance/insurance(50%),andgovernment(45%).

NorthAmerica Europe AsiaPacific

IncreasedriskcanbeattributedtousercarelessnessandsecurityvulnerabilitiesassociatedwithBYOD,accordingtorespondents.“Theriskcomesfromusersloweringtheirguardastherearesomanyotherthingsthathavechanged—healthrisks,workingfromhome,etc,”saidoneMSP.

55% 42% 47%

NorthAmericanMSPsaresomewhatmoreconcernedaboutcloudsecuritythantheirEuropeanandAsiaPacificcounterparts.

GEOTRENDS

Datto’sGlobalStateoftheChannelRansomwareReport 3

VarietyofMalwareTargetingSMBs

AmongthemalwarethreatsimpactingSMBs,ransomwareisstillatthetopoftheheap.However,it’sfarfromtheonlythreatontheirplate.Viruses,adware,spyware,andremoteaccesstrojansroundedoutthetopfive.

Cryptojacking,hotlastyear,cooledconsiderably,dropping15percentagepoints.Thistrackswithmainstreamreportsthat

cryptojackingisin

decline

ashackershavegrownimpatientwithslowreturnsoncoinmining.

Inthelasttwoyears,MSPsreportthefollowingtypesofmalwarehaveaffectedclients:

44%

Spyware

13%

Rootkits

15% 11%

Worms Exploitkits

56%

Viruses

68%

Ransomware

16%

Cryptojacking

53%

Adware

19%

Remoteaccess

trojans

11%

Keyloggers

*Surveyrespondentswereabletoselectmultipleanswerchoices.

Datto’sGlobalStateoftheChannelRansomwareReport 4

RansomwareStilla

MajorChallengeforMSPs

RansomwarecontinuestoplagueMSPsandtheSMBstheyserve.However,respondentsreportedaslightdeclineinthefrequencyofattacks.78%ofMSPsreportedattacksontheirclientsinthepasttwoyears,downfrom85%lastyear.Thatbeingsaid,ransomwareis

stillaveryrealthreatwith60%ofMSPsseeingattacksinthefirsthalfof2020.

ItisworthnotingthatthegeneraldisruptionofCOVID-19andresultingeconomicdownturnmayhaveimpactedthefrequencyofattacksontheSMBsthatMSPsserve.Thisispurelyspeculative,andoutsideoftheresearchconductedforthisreport.However,itwillbeinterestingtoseewhetherMSPsreportanuptickinransomwareattacksastheglobaleconomycontinuestorecover.

MSPsbelievethatwillbethecase.Nearlyallrespondentssaidtheyexpectransomwareattackswillriseintheupcomingyear.

78% 92%

ofMSPsreportattacksagainst ofMSPspredictattacks

SMBsinthelasttwoyears willincreaseinthenextyear

60% 11%

ofMSPsreportattacksagainst ofMSPsreportthatclients

SMBsin2020alone sufferedmultipleattacksin

asingleday

NorthAmerica Europe AsiaPacific

77% 85% 79%

EuropeanMSPsreportthattheirclientssufferedmoreattacksthananyotherregion.

GEOTRENDS

Datto’sGlobalStateoftheChannelRansomwareReport 5

Ransomwareisnotgoingaway,butattackersmayhaveshiftedtheirfocustemporarilytootherrevenuestreamsduringCOVID-19.Ifyouthinkofransomwarelikea‘business’thatneedstorespondtochangingmarketconditions,itmakessenseforthoseattackerstofocusonmorestablesourcesofrevenue,likelargerenterprises,duringaneconomicdownturn.Enterprisesbothrepresentalarger‘returnoninvestment’tohackersandaremoreresilienttofluctuationsintheeconomy.Ransomwareisanumbersgame,andlargercompaniessimplyrepresentabettertargetintougheconomictimes.

RyanWeeks

ChiefInformationSecurityOfficer,Datto,Inc.

Datto’sGlobalStateoftheChannelRansomwareReport 6

RansomwareAwareness

SMBsvs.MSPs

ThereisstilladisconnectbetweenSMBsandMSPswhenitcomestoperceptionsaboutransomware.ThemajorityofMSPsbelievebusinessesshouldbe“veryconcerned”aboutthethreatofransomware,butonly30%reporttheirclientsfeelthisway.However,itappearsthatSMBsarebeginningtounderstandhowdamagingransomwareattackscanbe.32%ofMSPsreportclientsare“moderatelyconcerned”and34%sayclientsare“somewhatconcerned”.

30% 84%

ofMSPsreportSMBsare ofMSPsreportSMBsshouldbe

“veryconcerned”about “veryconcerned”about

ransomware ransomware

SMBSecurityBudgetsontheRise

50%

ofMSPssaidtheirclientsincreased

budgetforITsecurityin2020.

Inadditiontothegrowingawarenessabove,increasedITsecurityspendingshowsthatSMBsarebeginningtotakeransomware,andsecurityingeneral,seriously.Theslightdeclineinransomwareattacksthisyearmightalsoindicatethatthesesecurityeffortsarehavingapositiveimpact.

NorthAmerica Europe AsiaPacific

31% 19% 33%

ComparedtotheirNorthAmericanandAsiaPacificcounterparts,fewerEuropeanMSPssaidtheirclientsfeel“veryconcerned”aboutransomwareattacks.

GEOTRENDS

Datto’sGlobalStateoftheChannelRansomwareReport 7

RansomwareContinuestoSkirtCybersecurityEfforts

Despiteincreasedsecurityspending,MSPsreportthatransomwareavertedcybersecurityeffortsincludingemployeeeducation,antivirus,emailfiltering,pop-upblockers,andendpointdetectionsolutions.Ofthem,50%saidransomwareavertedantivirus/anti-malwaresolutions.

Whenaskedaboutwhichantivirus/anti-malwaresolutionsspecifically,

MSPssaid:

59% 24%

Anti-malwarefiltering(email-, Endpointdetection

network-,andweb-based) andresponse

42% 12%

Legacysignature-based NextGenanti-virus

antivirus

Ransomwareisabletogetaroundthesesolutionsbecausethecybercriminalsfrequentlymodifytheirmalwaretoavoiddetection.What’sworse,thesocialengineeringtacticscriminalsusetodupevictimshavebecomeverysophisticatedandhardtodetect—evenwithsecurityeducation(moreonthatbelow).

That’swhyamultilayeredapproachtoransomwarethatincludesbusinesscontinuityissoimportant.Securitysoftwareandtrainingareessentialtopreventattacksbeforetheyhappen.Businesscontinuityenablesorganizationstoresumenormaloperationsquicklyifsecuritymeasuresfail.

Datto’sGlobalStateoftheChannelRansomwareReport 8

SMBsKeepTakingtheBait

Asnotedabove,endusereducationisanessentialpieceofaneffectiveransomwareprotectionstrategy.Thisyear’ssurveyresultsbearthatout:phishing,pooruserpractices,andlackofendusercybersecuritytrainingwerethethreemostcommoncausesofsuccessfulransomwarebreaches.

So,itisimportanttonotethatsecuritytrainingmustgobeyondjusthowtoidentifyphishingattacks.Whilephishingtoppedthelist,weakpasswords,openRDPaccess,andahostofotherusererrorswerealsotoblameforbreaches.

D

9CybersecurityTipsfor

EA

MSPstoBringtotheirClients

R

LeadingcausesofransomwareattacksreportedbyMSPs:

Phishingemails

60

54%

Pooruserpractices/gullibility

27%

Lackofcybersecuritytraining

26%

Weakpasswords/accessmanagement

21%

OpenRDPaccess

20%

Clickbait

17%

Maliciouswebsites

14%

Lost/stolenusercredentials

10%

LackoffundingforITsecuritysolutions

8%

Lackofexecutivebuy-inforadoptingsecuritysolutions

8%

*Surveyrespondentswereaskedtoselectthreeanswerchoices.

Datto’sGlobalStateoftheChannelRansomwareReport 9

TheAftermathofAttacks

Ransomwareattackscanresultinconsiderablebusinessdowntime,becausebreachesarerarelylimitedtoasinglecomputer.Mostoftheransomwareinusetodayisdesignedtocrawlbusinessnetworks,lookingforadditionalmachinestoinfect.Ifthemalwaregoesundetected,itdoesn’ttakelongfornumeroususerdevices,servers,andevendatainSaaSapplicationstobecomeencrypted.Restorescanbetimeconsuming,especiallyusingtraditionalbackuptools.

So,itmakessensethatlossofbusinessproductivityandbusiness-threateningdowntimewereatthetopofthelistofransomwareresults.Italsoexplainswhynearly20%ofMSPsreportedthatSMBswereforcedtopayaransominordertoreturntonormalbusiness.AllofthishighlightstheneedforabusinesscontinuitysolutionthatenablesSMBstoreturntoworkfast.

ConsequencesresultingfromransomwareattacksreportedbyMSPs:

Lossofbusiness

productivity

70

Stolendata

70

62%

13%

Business-threatening

Hackersthreatenedtopublicize

downtime

dataifransomwentunpaid

39%

10%

Ransomwareremained

Lostdataand/ordevice

onsystem,struckagain!

28%

6%

Decreased

Failuretomeet

customerprofitability

SLArequirements

24%

6%

Clientspaidransom

Failuretoachieve

andrecovereddata

regulatorycompliance

19%

4%

Paidaransombut

Damagedreputation

datawasneverreleased

17%

4%

*Surveyrespondentswereaskedtoselectthreeanswerchoices.

Datto’sGlobalStateoftheChannelRansomwareReport 10

DowntimeFarMore

CostlythanRansom

Whenitcomestoransomwareattacks,MSPsreportthecostofdowntimeisnearly50Xgreaterthantheransomrequested.

GEOTRENDS

AverageRansomin...

2018 2019 2020

$4,300 $5,900 $5,600

MSPsreporttheaveragecostofransomstayedroughlythesamein2020asitwasin2019.Sowhiletherehasbeenaslightdeclineinthefrequencyofattacks,hackersarestilldemandingahighransompayment.Wesawabiguptickinaverageransomfrom2018to2019,whenthedemandsincreasedby37%.

2020:Ransomvs.DowntimeCosts

Region

Ransom

Downtime

NorthAmerica

$6,200

$308,900

Europe

$3,500

$185,800

AsiaPacific

$4,400

$257,000

AverageCostofDowntimein...

2018

2019

2020

$46,800

$141,000

$274,200

MSPsreportedthattheaveragedowntimecostperincidenthasincreasedby94%from2019andastaggering486%from2018.

So,whatdoesthismeanexactly?Well,onfacevalueitmeansthatdowntimecostsarehigherthanreportedtwoyearsago,obviously.Thismaymeanthatdowntimecostshaveincreased,oritcouldmeanthatMSPsaregettingbetteratcalculatingtherealcostsofdowntime.Eitherway,it’sclearthatMSPsunderstandthatthedamageassociatedwithbusinessdowntimeisfarmorecostlythantheactualransom.

DowntimecostsvarywidelyamongbusinessesandthesenumbersarebasedonMSPestimates.Tocalculatethecostofpotentialdowntimeforyourbusiness,checkoutour

RecoveryTimeand

DowntimeCostCalculator

.

*AllsurveyrespondentsansweredinU.S.dollars.

Datto’sGlobalStateoftheChannelRansomwareReport 11

StillLocking

(AfterAll

TheseYears)

Forthe5thconsecutiveyearinarow,MSPsreportedCryptoLockerasthetopransomwarevariantimpactingtheirclients(52%).WannaCrywasnextonthelistat26%,followedbyCryptowall(16%)andLocky(13%).

Interestingly,33%ofrespondentssaidtheyweren’tsurewhatkindofransomwaretheydealtwith.Thisisimportanttonotefortworeasons.First,thetypeofransomwareultimatelydoesn’treallymatter—everytypecanresultinbusinessdowntime.Second,themethodsMSPsusetocombatransomwareandrecoverfollowingattacksarethesameregardlessofthestrain.

D

CommonTypes

EA

ofRansomware

R

0

10

20

30

40

50

60

CryptoLocker

52%

WannaCry

26%

Cryptowall

16%

Locky

13%

Emotet

10%

Petya

7%

CryptXXX

7%

TeslaCrypt

6%

notPetya

5%

TorrentLocker

4%

CBTLocker

3%

CoinVault

3%

CrySis 3%

Wallet 2%

Osiris 2%

Notsurewhattype

33%

*Surveyrespondentswereabletoselectmultipleanswerchoices.

Datto’sGlobalStateoftheChannelRansomwareReport 12

IndustriesMost

IndustriesmostsusceptibletoransomwareduetoCOVID-19:

SusceptibletoRansomware

ThisyearweaskedMSPswhatindustriesweremostsusceptibleto

ransomware

attacksduetoCOVID-19

.Perhapsnotsurprisingly,healthcarewasinthetopspot.59%ofMSPssaidtheybelievedhealthcaretobethemostvulnerable.Hackersarewellknownforstagingattacksagainstvictimsthatarealreadycompromisedinsomeway.So,itmakessensethatcybercriminalswouldgoafterhealthcareorganizationsduringaglobalpandemic.

Finance/insurancewasinthesecondslot(50%)andGovernmentinthird(45%).Theseverticalswerealsoseriouslyimpactedbythepandemicforobviousreasons.Outsideofthetopthree,therestofthelistlooksfairlysimilartopreviousyears’results.

Healthcare

Finance/Insurance

Government

Professional

Services

Education

HighTechnology

Legal

Non-Profit

Energy/

Utilities

Retail

Construction/

Manufacturing

RealEstate

Travel/

Transportation

Telecom

Media/

Entertainment

Consumer

Products

Architecture/Design

Other

0 10 20 30 40 50 60 70

59%

50%

45%

41%

36%

35%

35%

29%

29%

27%

25%

23%

22%

22%

22%

18%

17%

7%

*Surveyrespondentswereabletoselectmultipleanswerchoices.

Datto’sGlobalStateoftheChannelRansomwareReport 13

HackersAren’t

OnlyTargetingSMBs…

95%ofrespondentsagreedthatMSPsarebeingincreasinglytargeted

byransomwareattacks.Thisislikelyduetoanumberofhighprofile

attacksonSMBsin

recentmemory

.Inattackslikethese,hackersuse

MSPcredentialstoaccessandspreadransomwaretotheirclients.In

otherwords,bycompromisinganMSP,cybercriminalsgetmorebangfor

theirbuck.

MSPsaretakingthethreatseriously.Morethanhalfarenowusing

passwordmanagementandmulti-factorauthenticationtools,asyou

willseebelow.

2FAandSSOUse

44%reportedthattheyareusinganidentityproviderforSingleSign-on

(SSO).MicrosoftAzureActiveDirectorywasbyfarthetopchoiceofSSO

identityprovidersamongrespondents.47%ofMSPssaidtheyuseAzure

ADforSSO.Ofthat44%,nearly70%usethesameproviderfortwo-factor

authentication(2FA).

Datto’sGlobalStateoftheChannelRansomwareReport 14

AlmostHalfofMSPsPartnerwithMSSPs

46%ofMSPsnowpartnerwithmanagedsecurityserviceproviders(MSSPs)forassistancewithITsecurity—fortheirclientsandtheirownbusinesses.Infact,thenumberonereasonMSPsreporteddoingsowastoimprovetheirownsecuritypreparedness—anothersignthatMSPsaretakingthepossibilityofattacksontheirownbusinessesseriously.

Ultimately,partneringwithanMSSPboilsdowntoaccessingexpertguidance.ITsecurityisabroad,complexdisciplinewhichrequiresspecializationtodevelopexpertise.MSSPshaveit,andMSPsneedit.

46%ofMSPsnowpartner

withMSSPsforassistance

withITsecurity

MSPsthatpartnerwithMSSPscitedthefollowingreasons:

0 10 20 30 40 50 60

Toboostcybersecurity/

ransomware 54%

preparednessatmyMSP

Toreducecyberrisk

47%

tomybusiness

Tobetterunderstand

availableandeffective 45%

securitytechnologies

Forcybersecurity

45%

solutionsales

Toeducatemystaff

throughexperienceand 35%

exposure

Apathwayto

transformingmyMSPto 23%

anMSSP

Tosharecyberriskwith

22%

anotherorganization

Other 10%

*Surveyrespondentswereabletoselectmultipleanswerchoices.

Datto’sGlobalStateoftheChannelRansomwareReport 15

WindowsEndpointSystemsApplicationsMostTargetedbyHackers

91%ofransomwareattackstargetedWindowsPCsthisyear,accordingtoMSPs.ThistrackswithphishingemailsbeingthenumberoneattackvectorandthesheernumberofWindowsPCsinusetoday.Italsohighlightstheneedforendpointprotectionandbackupsolutions.Ransomwareattacksonthesesystemshaveasignificantimpactonuserproductivity,andinturn,abusiness’abilitytogeneraterevenue.Solutionsthatallowemployeestoreturntoworkquicklyfollowingattacksshouldbeconsideredessential.

WindowsServersfollowedat76%.That’sbecauseransomwaremayenteranetworkviaaphishingemail,butasnotedabove,itdoesn’ttakelongbeforethemalwarespreadsacrossnetworkstoinfectothersystems.Abusinesscontinuitysolutionthatcanrecoverserverworkloadslocallyorinthecloudiscriticaltominimizebusinessinterruptionfollowingaransomwareattack.

Endpointsystemsmosttargetedbyransomwareattacks:

WindowsPCs WindowsServer

91% 76%

WindowsTablet AppleMacOS

8% 7%

Android AppleiOS

6% 4%

*Surveyrespondentswereabletoselectmultipleanswerchoices.

Datto’sGlobalStateoftheChannelRansomwareReport 16

RansomwareCreeps

IntoSaaSApps

Nearly1in4MSPsreportedransomwareattacksonclients’SaaS

applications.Ofthem,Microsoftwashitthehardest.Thisisn’t

particularlysurprising,sincesomanyorganizationsrelyonMicrosoft

Itwassomewhatsurprising,however,toseethatmorethanhalfsawransomwareinDropbox.GoogleWorkspaceroundedoutthetopthreeat25%.

64%

54%

25%

ofMSPsreport

ofMSPsreport

ofMSPsreport

attackswithin

attackswithin

attackswithin

Microsoft365

Dropbox

GoogleWorkspace

HumanErrorHappens:

HowSaaSBackupCanHelp

READ

*Surveyrespondentswereabletoselectmultipleanswerchoices.

Datto’sGlobalStateoftheChannelRansomwareReport 17

MostCommon

Ransomware

RecoveryMethods

Re-imagingamachinefromabackupwasthenumberoneransomware

recoverymethodthisyear.Thisisasignificantchangefromlastyear,

whenre-imagingfromdefaulttookthetopspot.Thisyearthatwasin

thethirdspottiedwithvirtualizingthesystemfromabackupimage.

76%

33%

27%

Restoreamachine

Re-image

Runsoftwareto

fromabackup

fromdefault

cleanupthreat

36%

31%

15%

Restorefromfiles

Virtualizethe

Paidransom

systemfroma

backupimage

*Surveyrespondentswereabletoselectmultipleanswerchoices.

Datto’sGlobalStateoftheChannelRansomwareReport 18

I’mpleasedtoseethat‘re-imagingfrombackup’wasthetopmethodMSPsareusingtorecoverfromransomwareattacks.ThisshowsMSPshavematuredtheirrecoverymethods.Twoyearsago,MSPswerestilldealingwiththeshockofransomware,scramblingtoputsomethinginplaceforrecoveryandlargelyre-imagingmachinesfromscratch.Lastyear,theywereintheprocessofchanginghowtheydothings,puttingtherightsolutionsinplacewiththeircustomerstominimizedowntimeanddataloss.Now,wearestartingtoseeresultsofthoseeffortsmanifestinmorematurerecoverymechanisms.

RyanWeeks

ChiefInformationSecurityOfficer,Datto,Inc.

Datto’sGlobalStateoftheChannelRansomwareReport 19

BCDRClientsAreLessLikelyToExperienceSignificantDowntime

91%

ofMSPssaidclientswithBCDRproductsin

placearelesslikelytoexperiencesignificant

downtimefromransomware.

MostEffectiveSolutionsto

CombatRansomware

Businesscontinuityand

disasterrecovery(BCDR)

Employeetraining

Endpointdetectionand

responseplatform

Patchmanagement

Unifiedthreatmanagement

Identityaccess

managementsolution

Antivirus/Anti-malwaresoftware

Email/Spamfilters

Endpoint/Mobile

managementplatform

Browserisolation

Datto’sGlobalStateoftheChannelRansomwareReport 20

WerequireDattoSIRISasaminimumforallourclientsasoneofthesecurity/continuitylayersweputinplace.Tome,it’sju

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论